Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Janela RAT Malware Targets Latin American Financial Sector

Janela RAT Malware Targets Latin American Financial Sector

Posted on April 14, 2026 By CWS

A sophisticated malware operation, identified as Janela RAT, is targeting financial entities and cryptocurrency services throughout Latin America. This campaign employs deceptive MSI installer files and harmful browser extensions to access sensitive financial information from victims.

Janela RAT: A New Threat in Latin America

Initially detected in mid-2023, Janela RAT is considered an evolved form of the older BX RAT, now enhanced with advanced functionalities. The malware is specifically designed to target individuals and organizations in Chile, Colombia, and Mexico, with a focus on the banking, fintech, and cryptocurrency industries.

The attackers behind Janela RAT are financially driven, aiming to steal credentials and gain unauthorized access to financial accounts. According to KPMG experts, this multi-layered attack poses a significant risk to the financial infrastructure in the region.

How Janela RAT Operates

Researchers have observed that Janela RAT masquerades as legitimate software on public GitLab repositories, complicating detection. This campaign’s ability to silently manipulate browser settings and maintain encrypted communication with attacker-operated servers makes it challenging to counteract.

The implications of this campaign extend beyond mere data theft. By accessing browser information such as cookies, saved credentials, and browsing history, attackers can fully monitor and control a victim’s financial activities. This level of intrusion allows for account takeover and real-time transaction monitoring without the victim’s knowledge, posing severe operational and reputational risks to affected organizations.

Technical Details and Defensive Measures

The infection process begins when a user unknowingly executes an MSI-format software installer from a public GitLab repository. This installer initiates a sequence of scripts—written in Go, PowerShell, and batch—each contributing to the malware’s deployment. A Go-based unpacker is used to extract encrypted command-and-control (C2) information, which is then stored in a config.json file for ongoing operations.

Simultaneously, the scripts search for any Chromium-based browsers on the machine, modify their startup settings, and install a malicious extension to harvest sensitive data. The extension functions as a native messaging host, gathering system details, cookies, browsing history, and more. It also monitors for specific URL patterns, triggering further actions upon encountering banking or cryptocurrency sites.

To remain undetected, Janela RAT employs encrypted WebSocket connections and obfuscates its communication domains. It dynamically changes C2 addresses and remains inactive during idle periods to avoid detection by behavior-based security systems.

Security teams are encouraged to monitor their environments for known Indicators of Compromise (IoCs) related to Janela RAT. It is crucial to ensure all Windows systems are updated and protected with multi-factor authentication. Conducting comprehensive threat assessments can help identify vulnerabilities and improve security defenses.

Cyber Security News Tags:browser hijacking, Cryptocurrency, Cybersecurity, data theft, financial sector, Janela RAT, KPMG, Latin America, Malware, RAT

Post navigation

Previous Post: CISA Alerts on Critical Windows and Adobe Vulnerabilities
Next Post: Adobe Fixes 55 Security Flaws in Multiple Products

Related Posts

New TAOTH Campaign Exploits End-of-Support Software to Distribute Malware and Collect Sensitive Data New TAOTH Campaign Exploits End-of-Support Software to Distribute Malware and Collect Sensitive Data Cyber Security News
Django Critical Vulnerability Let attackers Execute Malicious SQL Code on Web Servers Django Critical Vulnerability Let attackers Execute Malicious SQL Code on Web Servers Cyber Security News
Critical React2Shell Vulnerability Under Attack Critical React2Shell Vulnerability Under Attack Cyber Security News
New VMScape Spectre-BTI Attack Exploits Isolation Gaps in AMD and Intel CPUs New VMScape Spectre-BTI Attack Exploits Isolation Gaps in AMD and Intel CPUs Cyber Security News
Agent Tesla Phishing Campaign Evades Detection with Advanced Tactics Agent Tesla Phishing Campaign Evades Detection with Advanced Tactics Cyber Security News
CISOs Guide to Regulatory Compliance in Global Landscapes CISOs Guide to Regulatory Compliance in Global Landscapes Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • OpenAI Launches Expanded Cyber Defense with GPT-5.4-Cyber
  • AI-Powered Exploit Reveals Chrome Vulnerability Risks
  • Apple Aims to Fix iPhone Bug Removing Czech Character
  • Emerging Nexcorium Botnet Exploits DVR Vulnerability
  • Tycoon 2FA Loses Ground Amid Rising Phishing Threats

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • OpenAI Launches Expanded Cyber Defense with GPT-5.4-Cyber
  • AI-Powered Exploit Reveals Chrome Vulnerability Risks
  • Apple Aims to Fix iPhone Bug Removing Czech Character
  • Emerging Nexcorium Botnet Exploits DVR Vulnerability
  • Tycoon 2FA Loses Ground Amid Rising Phishing Threats

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark